Understanding Email Data Protection

Hide details

Brian Tokuyoshi, Product Marketing Manager

Email is an essential form of communication, but it also a potential source of compliance and data loss issues. If an email gets in the hands of an unauthorized party, it could lead to exposure of personal information, a breach of the separation of duties, or even require data breach notification.

In order to keep email communication secure, organizations are turning towards data protection solutions. But which one? There are many different approaches to email data protection and it can be hard to sort out which is the best method for your company.

In addition, with proper data protection, email can lead to significant cost savings through the adoption of electronic statement delivery. Find out how to adapt your green initiatives to lead to hard savings.

In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.

Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
• Take a deep dive into multi-vector DoS attack strategies
• Learn how to attack yourself in a controlled, safe environment
• Create a DDoS Range to test your network defenses, personnel, and incident playbook

Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.

Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

1) Executive mandate to "Do more with less"
- Free-up your time to do what you do best
- Vendor consolidation
- Outsource, focus Internal resources on strategic tasks

2) Lack of IT Expertise at remote sites
- Consistency of deployment, Office in a box
- How to make sure all locations have the same technology
- Preplanned for growth and new services

3) Sometimes lack of ownership of remote sites (Franchises)

4) Security compliance/PCI DSS

5) High availability
- Network is down, business has stopped (can't take payments)

Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.

Are you thinking about deploying data loss prevention (DLP), but not sure where to start? Join this webcast to learn how you can achieve quick wins and reduce your data loss risk. You'll hear best practices based on customer experiences.

Are you worried about protecting your intellectual property (IP), but can’t get your arms around it? Finding data is like looking for the proverbial needle in the haystack. IP is buried in documents, spreadsheets and reports across your network. A new DLP technology based on machine learning, a branch of artificial intelligence, now makes it simpler to find and protect IP.

During this webinar, viewers will learn:

• The Challenge of Finding IP
• A New Way to Find & Protect IP
• How Vector Machine Learning Works
• Automated Zero-Day Protection for Data
• The New ABCs of DLP: Describe, Fingerprint & Learn

The benefits of mobile computing come at a price for information security professional. Employees want the benefit of being able to access information on the go, but what risks does mobility pose to sensitive data? In this session, learn about the deployment issues associated with protecting data on the go. Ensure that employees can handle data safely when using smartphones, laptops and removable storage.

Are you thinking about deploying data loss prevention (DLP), but not sure where to start? Join this webcast to learn how you can achieve quick wins and reduce your data loss risk. You’ll hear best practices from an InfoSec veteran who has had success with DLP.

We’ve entered a new era in which organizations suddenly find their most confidential information splashed across the Internet. In the wake of this intense media attention, you may be asking yourself, “What steps can I take to help my company avoid this same fate?”

Symantec has been working with financial services customers who are concerned about preventing these same issues. We have developed a set of best practices that can help defend against these types of breaches.

Viewers will learn:

• How to identify the internal and external risks that could lead to a data breach
• Recommended counter measures from financial services customers on how to defend against these types of breaches

Users are increasingly adopting smart phones and tablet devices as their default computing platform. In response to this trend, businesses are delivering applications to these devices to deliver new products, streamline customer service, and drive customer satisfaction. However, exposing information via mobile devices risks exposing users’ information to unauthorized access. Reducing this risk demands an authentication solution for your mobile application that balances the need for security with a simple user experience.

Join Symantec’s User Authentication group for this one-hour webcast to learn how USAA, a leading provider of financial services, embedded Symantec strong authentication into its mobile application to deliver a superior and secure user experience that accelerated adoption of its mobile banking application.

IT organizations have been asking about support for Opal-compliant self-encrypting drives for quite awhile now. Opal-compliant hardware availability is slowly trickling out to the purchasing public. The question then becomes, “It’s here! What do I do next?”

Join us for this informative session on hardware-based encryption as we’ll talk about managing these new hardware based encrypted drives, as well as your existing software based encrypted drives. We’ll discuss the advantages and disadvantages of self-encrypting drives vs. the standard non-encrypting drives. We’ll also discuss deployments and management of self decrypting drives, and managing these hybrid encryption environments.

The perimeter around the modern enterprise has become increasingly porous over the past five years. Employees that traditionally resided within the organization’s four walls have altered their work patterns and become increasingly mobile. At the same time, the accelerating pace of business has forced enterprises to open their networks to business partners to obtain or deliver new services faster, and more cost-effectively. While these new patterns of behavior drive productivity, they also increase an organization’s exposure to risk. A key struggle for a modern enterprise is enabling access to sensitive networks, applications, and data – but only to the right individuals. This session will detail how modern strong authentication solutions can provide secure access to sensitive information and applications, while accounting for the unique needs of different business partners, employees, and customers.

IT organizations with the mandate to encrypt information are finding that there is more data in more places. This leads to the question of how to build a proper strategy to ensure that it is protected in all places, and keep it running with strong management tools.

In this session, learn about how IT issues such as mobility and management affect encryption requirements.

Attend this session if you have questions such as:

• How can I let my employees use iPads with encrypted email?
• What considerations do I need to think about with hardware-based encryption?
• How can I make sure that my encryption deployments are always well managed?

Join this webcast to find out what’s new with Symantec’s encryption solutions, and get a clear understanding on how to protect more data in more places.

Are you worried about protecting your intellectual property (IP), but can’t get your arms around it? Finding data is like looking for the proverbial needle in the haystack. IP is buried in documents, spreadsheets and reports across your network. A new DLP technology based on machine learning, a branch of artificial intelligence, now makes it simpler to find and protect IP.

During this webinar, viewers will learn:

• The Challenge of Finding IP
• A New Way to Find & Protect IP
• How Vector Machine Learning Works
• Automated Zero-Day Protection for Data
• The New ABCs of DLP: Describe, Fingerprint & Learn

In recent weeks, attackers allegedly using duplicate RSA SecurID tokens have attempted to gain access to several organizations’ sensitive networks. These attacks follow previous assurances by RSA that information extracted during the RSA breach could not be used to enable a successful direct attack against its customers.

In the wake of these attacks, many organizations are now seeking a secure alternative to mitigate the risk of experiencing a similar breach.

Join us for this hour webcast to learn:

• The potential impact this kind of breach could have on your organization’s risk and costs
• A strategy to quickly and easily migrate critical systems to a secure alternative
• How you can transform this incident into an opportunity for your business

In recent weeks, attackers allegedly using duplicate RSA SecurID tokens have attempted to gain access to several organisations' sensitive networks. These attacks follow previous assurances by RSA that information extracted during the RSA breach could not be used to enable a successful direct attack against its customers.

In the wake of these attacks, many organisations are now seeking a secure alternative to mitigate the risk of experiencing a similar breach.

Join us for this webcast to learn:

• The potential impact this kind of breach could have on your organisation's risk and costs
• A strategy to quickly and easily migrate critical systems to a secure alternative
• How you can transform this incident into an opportunity for your business
• A fantastic financial incentive Symantec has to further help your transition

This session will focus on how to get the most from your Data Loss Prevention (DLP) technologies, through some new functionalities.

DLP simplifies the detection and protection of enterprises’ most valuable information – their intellectual property. During this webinar, fInd out more about Symantec's major new release of the leading data security suite features including:

We’ve entered a new era in which organizations suddenly find their most confidential information splashed across the Internet. In the wake of this intense media attention, you may be asking yourself, “What steps can I take to help my company avoid this same fate?”

Symantec has been working with financial services customers who are concerned about preventing these same issues. We have developed a set of best practices that can help defend against these types of breaches.

Viewers will learn:

• How to identify the internal and external risks that could lead to a data breach
• Recommended countermeasures from financial services customers on how to defend against these types of breaches

This is an in-depth look of how to use Symantec email encryption solutions including the Symantec PGP Universal Gateway Email and Symantec PGP Desktop email . Symantec PGP Email encryption application which can be adapted to a wide variety of enterprise needs. In this web cast we’ll examine how to protect email and enable organisations to encrypt email both internally and externally to allow 3rd parties to share the benefits of encrypted communications distributed to partners and customers. We’ll also demonstrate how PGP Universal Server is able to provide centralised key generation and lookup, and improved logging, reporting and overall management of keys.

This is a technical presentation and a detailed understanding of encryption techniques is recommended.

Please join us to hear how you can protect against loss and theft of your IP, through the latest integration of Symantec Data Loss Prevention (DLP) and Endpoint Encryption.

According to the latest Forrester research, most companies are under-invested in protecting their IP. If you’re like most of your peers, you’ve already taken steps to protect credit card data – but what are you doing to protect your IP?
Through this integration of DLP and Endpoint Encryption, you can:
•Quickly identify laptops and desktops that contain your IP and take steps to clean them up
•Protect against laptop loss or theft that may lead to exposure of your IP
•Reduce legal costs associated with IP theft by blocking malicious activity
•Monitor and apply policy around how your IP is being used while employees are off your trusted network
In this age of Stuxnet and WikiLeaks, malicious attacks are designed specifically to capture IP - with potentially devastating results. Attend this webcast to learn how you can protect your firm from these emerging threats through defense in depth at the endpoint from Symantec
.

Symantec Corporation is a global leader in Email and Data Encryption software and Data Loss Prevention providing Trusted Data Protection. Our presenters usually are combined with a customer, analyst or partner. We plan a webcast once a month and they are targeted to software security professional.